Question No: 51 – (Topic 1)

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.

The domain contains a user named User1 and a global security group named Group1. User1 logs on to a client computer named Computer1.

You need to disable the computer account of Computer1.

Which cmdlet should you run?

Add-AdPrincipalGroupMember.hip

Install-AddsDomainController

Install WindowsFeature

Install AddsDomain

Roname-AdObject

Set-AdAccountControl

Set-AdGroup

Set-User

Answer: F Explanation:

Set-ADAccountControl Enabled

Specifies if an account is enabled. An enabled account requires a password. This parameter sets the Enabled property for an account object. This parameter also sets the ADS_UF_ACCOUNTDISABLE flag of the Active Directory User Account Control (UAC) attribute. Possible values for this parameter include:

$false or 0

$true or 1

The following example shows how to set this parameter to enable the account.

-Enabled $true

Question No: 52 HOTSPOT – (Topic 1)

Your network contains an Active Directory domain named contoso.com.

Computer accounts for the marketing department are in an organizational unit (OU) named Departments\Marketing\Computers. User accounts for the marketing department are in an OU named Departments\Marketing\Users.

Marketing users can only log on to the client computers in the Departments\Marketing\Computers OU.

You need to apply an application control policy to all of the marketing users.

Which Group Policy Object (GPO) should you configure? To answer, select the appropriate GPO in the answer area.

Answer:

Explanation:

Application control policies specify which programs are allowed to run on the local computer and which are not.

Question No: 53 – (Topic 1)

The domain contains 500 client computers. There are an additional 20 computers in a workgroup.

You discover that every client computer on the network can add its record to the contoso.com zone.

You need to ensure that only the client computers in the Active Directory domain can register records in the contoso.com zone.

What should you do?

Sign the contoso.com zone by using DNSSEC.

Configure the Dynamic updates settings of the contoso.com zone.

Configure the Security settings of the contoso.com zone.

Move the contoso.com zone to a domain controller that is configured as a DNS server.

Answer: B

Question No: 54 – (Topic 1)

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server 1. Server1 runs Windows Server 2012 R2 and has the DHCP Server server role installed.

You create two IPv4 scopes on Server1. The scopes are configured as shown in the following table.

The DHCP clients in Subnet_Tor can connect to the client computers in Subnet_Mtl by using an IP address or a FQDN. You discover that the DHCP clients in Subnet_Mtl can connect to client computers in Subnet_Tor by using an IP address only.

You need to ensure that the DHCP clients in both subnets can connect to any other DHCP client by using a FQDN.

What should you add?

The 006 DNS Servers option to Subnet_Mtl

The 006 DNS Servers option to Subnet_Tor

The 015 DNS Domain Name option to Subnet_Mtl

The 015 DNS Domain Name option to Subnet_Tor

Answer: A

Question No: 55 HOTSPOT – (Topic 1)

Your network contains an Active Directory domain named contoso.com.

The domain contains an organizational unit (OU) named OU1 as shown in the OU1 exhibit. (Click the Exhibit button.)

The membership of Group1 is shown in the Group1 exhibit. (Click the Exhibit button.)

You configure GPO1 to prohibit access to Control Panel. GPO1 is linked to OU1 as shown in the GPO1 exhibit. (Click the Exhibit button.)

Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point.

Answer:

Explanation:

C:\Users\Kamran\Desktop\1.jpg

Group Policy does NOT APPLY TO SECURITY GROUPS, only users and computers in an OU. Consequently, the only users in the OU are User2 and User4. Since the Security Filtering specifies that the policy will only apply to users/computers in the OU who are members of Group1 or User3, User4 will not have the policy applied. Since User2 is, in fact, a member of Group1, the policy will be applied to user 2. Thus, the only user who will not be able to access the control panel is User2.

Question No: 56 HOTSPOT – (Topic 1)

You have a Hyper-V host named Hyperv1 that runs Windows Server 2012 R2. Hyperv1 hosts a virtual machine named Server1. Server1 uses a disk named Server1.vhdx that is stored locally on Hyperv1.

You stop Server1, and then you move Server1.vhdx to an iSCSI target that is located on another server.

You need to configure Server1 to meet the following requirements:

->Ensure that Server1 can start by using Server1.vhdx.

->Prevent Server1.vhdx from consuming more than 500 IOPS on the iSCSI target.

Which two objects should you configure? To answer, select the appropriate two objects in the answer area.

Answer:

Question No: 57 HOTSPOT – (Topic 1)

You have a Hyper-V host named Server1 that runs Windows Server 2008 R2. All of the virtual machines on Server1 use VHDs.

You install the Hyper-V server role on a server named Server2 that runs Windows Server 2012 R2. Server2 has the same hardware configurations as Server1.

You plan to migrate the Hyper-V host from Server1 to Server2 by using the Windows Server Migration Tools.

In the table below, identify what can be migrated by using the Windows Server Migration Tools. Make only one selection in each row. Each correct selection is worth one point.

Answer:

Explanation:

* The following configurations and settings can be migrated automatically include:

/ Most virtual machine configurations. Virtual machines and their data are moved as part of the migration, but some configurations require manual intervention

/ Hyper-V settings. These include the system-wide settings and the authorization store.

Question No: 60 DRAG DROP – (Topic 1)

Server1 has two network adapters. Each network adapter must be configured as shown in

the following table.

You need to configure the correct IPv6 address prefix for each network adapter. Which prefix should you select for each network adapter?

To answer, drag the appropriate IPv6 prefix to the correct network adapter in the answer area.

Each prefix may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

Answer:

Explanation:

An IPv6 multicast address always begins with 11111111 or FF and includes additional structure that identifies the scope of the address and the multicast group to which the interface belongs.IPv6 multicast addresses, therefore, are always of the form FF00::/8.